These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

92 related articles for article (PubMed ID: 26204721)

  • 1. Seizing the real opportunity presented by data breaches.
    Free J
    Health Manag Technol; 2015 Mar; 36(3):2. PubMed ID: 26204721
    [No Abstract]   [Full Text] [Related]  

  • 2. Providers face uphill battle on data breaches. Healthcare organizations need a new approach in dealing with this pervasive and costly problem.
    Degaspari J
    Healthc Inform; 2013 Feb; 30(1):52, 54, 56. PubMed ID: 23505950
    [No Abstract]   [Full Text] [Related]  

  • 3. Time for an update: Health data breaches cited in GAO's call for fix.
    Conn J
    Mod Healthc; 2012 Aug; 42(32):8-9. PubMed ID: 22953491
    [No Abstract]   [Full Text] [Related]  

  • 4. STOPPING HACKERS.
    Morrissey J
    Health Data Manag; 2016 Feb; 24(2):24-6, 28, 30. PubMed ID: 27032237
    [No Abstract]   [Full Text] [Related]  

  • 5. Protect your practice after a data breach.
    Sprey E
    Med Econ; 2016 Feb; 93(4):66-9. PubMed ID: 27079076
    [No Abstract]   [Full Text] [Related]  

  • 6. Keeping data safe. The threat of security breaches can fuel preventive strategies.
    Rogoski RR
    Healthc Inform; 2014 Mar; 31(2):37-9. PubMed ID: 24812992
    [No Abstract]   [Full Text] [Related]  

  • 7. 5 steps to prevent a data breach in your practice.
    Rey J
    Med Econ; 2011 Oct; 88(20):54-5. PubMed ID: 22175183
    [No Abstract]   [Full Text] [Related]  

  • 8. How safe is your patient data?
    Lowes R
    Med Econ; 2006 Mar; 83(6):22-5. PubMed ID: 16619786
    [No Abstract]   [Full Text] [Related]  

  • 9. Protecting health data in a troubling time. Understand who and what you're up against.
    Ropp R; Quammen B
    Health Manag Technol; 2015 Jul; 36(7):14-5. PubMed ID: 26302609
    [No Abstract]   [Full Text] [Related]  

  • 10. Security, durability & portable computers.
    Miller D
    Healthc Inform; 1993 May; 10(5):72, 74. PubMed ID: 10126082
    [No Abstract]   [Full Text] [Related]  

  • 11. Experts doubt Anthem breach will boost security spending.
    Conn J
    Mod Healthc; 2015 Feb; 45(6):9. PubMed ID: 25826854
    [No Abstract]   [Full Text] [Related]  

  • 12. Cybersecurity: The heat is on.
    Morrissey J
    Trustee; 2015 Oct; 68(9):15-8. PubMed ID: 26665703
    [TBL] [Abstract][Full Text] [Related]  

  • 13. What the 'Red Flags Rule' means for medical practices.
    Stanley R
    MGMA Connex; 2010 Apr; 10(4):25-6. PubMed ID: 20433013
    [No Abstract]   [Full Text] [Related]  

  • 14. Is your practice at risk for medical identity theft?
    Weinstock D
    J Med Pract Manage; 2014; 30(3):168-70. PubMed ID: 25807617
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cybersecurity for the travelling scientist.
    Owens B
    Nature; 2017 Aug; 548(7665):123-124. PubMed ID: 28770861
    [No Abstract]   [Full Text] [Related]  

  • 16. Putting the brakes on identity theft.
    Hogan CE
    N Y State Dent J; 2008; 74(4):6-7. PubMed ID: 18788173
    [No Abstract]   [Full Text] [Related]  

  • 17. California sets standard on identity theft safeguards.
    Patient Care Manag; 2003 Sep; 19(9):1-2. PubMed ID: 12968501
    [No Abstract]   [Full Text] [Related]  

  • 18. Physical security, HIPPA, and the HHS wall of shame.
    Sage A
    J Healthc Prot Manage; 2014; 30(1):85-90. PubMed ID: 24707760
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Taxpayer identification numbers and identity theft.
    Nagy R; Tuma K
    J Mich Dent Assoc; 2008 May; 90(5):34, 36. PubMed ID: 18557277
    [No Abstract]   [Full Text] [Related]  

  • 20. Risk management. Theft happens. Protecting the data is what matters.
    Terreri A
    Hosp Health Netw; 2009 Feb; 83(2):10. PubMed ID: 19294968
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 5.